Ninja Forms Exploit: Unauthenticated RCE Threatens WordPress Sites

Ninja Forms Exploit: Unauthenticated RCE Threatens WordPress Sites

A critical vulnerability, tracked as CVE-2026-0740, is actively being exploited in the Ninja Forms File Uploads premium add-on for WordPress. This flaw allows unauthenticated attackers to upload arbitrary files, including malicious PHP scripts, directly onto a targeted server. The issue stems from a failure to properly validate file types and extensions on the destination filename, enabling attackers to bypass security checks and execute code remotely. Wordfence, a prominent WordPress security firm, reported blocking over 3,600 such attacks in a single 24-hour period, highlighting the immediate danger.

This vulnerability affects Ninja Forms File Upload versions up to 3.3.26 and carries a severe CVSS score of 9.8. The lack of filename sanitization also permits path traversal, allowing uploaded files to be placed in sensitive directories, potentially even the webroot. This opens the door for attackers to not only upload malicious code but also to execute it, compromising the entire WordPress installation. Given that Ninja Forms has over 600,000 downloads and its File Upload extension is used by 90,000 customers, the attack surface is significant.

What This Means For You

  • Given the active exploitation and unauthenticated nature of this critical RCE vulnerability in a widely used WordPress plugin, organizations should immediately audit their WordPress installations for the Ninja Forms File Uploads add-on and update to a patched version. If patching isn't feasible, consider temporarily disabling the File Upload functionality or implementing stricter Web Application Firewall (WAF) rules to block suspicious upload attempts targeting the plugin.
๐Ÿ”Ž
Turn this CVE into SIEM detection coverage Generate detection rules for Splunk, Sentinel, QRadar & Elastic โ€” straight from this vulnerability. Use /detect in the Intel Bot.
Open Intel Bot โ†’

Related coverage

CISA Opens KEV Catalog to External Vulnerability Reports

The Cybersecurity and Infrastructure Security Agency (CISA) has launched a new nomination form, allowing external researchers, vendors, and industry partners to submit vulnerabilities for inclusion...

threat-inteldata-breachgovernmentvulnerability
/SCW Vulnerability Desk /HIGH /⚑ 1 IOC

Ghostwriter Targets Ukraine Government with Prometheus Phishing

The Belarus-aligned threat actor, Ghostwriter (also tracked as UAC-0057 and UNC1151), is actively targeting Ukrainian government entities. According to The Hacker News, this group is...

threat-intelvulnerabilitymalwarephishing
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 3 Sigma

Huawei Router Flaw Triggered Telecom Blackout, SecurityWeek Reports

SecurityWeek reports on a critical flaw in Huawei routers that led to a significant telecom blackout. While details are sparse, the incident underscores the inherent...

threat-intelvulnerabilityidentity
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 3 Sigma